Systems and methods for managing contact information
First Claim
Patent Images
1. Method for secure management of contact information via a network, comprising:
- attaching contact information to an e-mail having a recipient'"'"'s e-mail address, associating a transaction ID with the contact information, associating a first hash of the recipient'"'"'s e-mail address with the transaction ID, transmitting the e-mail with the transaction ID to the recipient via the network, producing a second hash of the recipient'"'"'s e-mail address, and if the second hash of the recipient'"'"'s e-mail address and transmitted transaction ID match the first hash of the recipient'"'"'s e-mail address and the transaction ID, forwarding the contact information to the recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for secure management of contact information is disclosed. A service provider maintains a database with subscribers'"'"' updated contact information, such as address book entries and other personal and business information. When a user'"'"'s information changes, subscribers on a recipient list are automatically updated without any user intervention. The subscribers'"'"' anonymity is assured by correlating contact information in the provider'"'"'s database with encrypted subscriber ID'"'"'s, such as hashed e-mail addresses.
-
Citations
20 Claims
-
1. Method for secure management of contact information via a network, comprising:
-
attaching contact information to an e-mail having a recipient'"'"'s e-mail address, associating a transaction ID with the contact information, associating a first hash of the recipient'"'"'s e-mail address with the transaction ID, transmitting the e-mail with the transaction ID to the recipient via the network, producing a second hash of the recipient'"'"'s e-mail address, and if the second hash of the recipient'"'"'s e-mail address and transmitted transaction ID match the first hash of the recipient'"'"'s e-mail address and the transaction ID, forwarding the contact information to the recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 18, 19, 20)
-
-
15. Method for secure management of contact information over a network, comprising:
-
associating a transaction ID with the contact information, computing a hash of an e-mail address of an intended recipient of the contact information, and associating the hashed e-mail address with the transaction ID.
-
-
17. A system for disseminating contact information via a network, comprising:
-
a server connected to the network and storing the contact information, a sender'"'"'s computer connected to the network and transmitting via the network to a recipient'"'"'s e-mail address an e-mail that includes an identifier associated with the sender'"'"'s contact information, and a recipient'"'"'s computer connected to the network and receiving the e-mail with the identifier, the recipient'"'"'s computer accessing the server via the network and retrieving from the server the contact information by providing the server with the identifier.
-
Specification